Skip to content

Commit fb5b74a

Browse files
committed
Update linux-support-offline-security-intelligence-update.md
1 parent cba8c38 commit fb5b74a

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

defender-endpoint/linux-support-offline-security-intelligence-update.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -173,11 +173,11 @@ Once the signatures zip is downloaded, the mirror server can be used to host it.
173173
Once hosted, copy the absolute path of the hosted server (up to and not including the `arch_*` directory).
174174

175175
> [!NOTE]
176-
> For example, if the downloader script is executed with `downloadFolder=/tmp/wdav-update`, and the HTTP server (`www.example.server.com:8000`) is hosting the `/tmp/wdav-update` path, then the corresponding URI is: `www.example.server.com:8000/linux/production/` (verify that this within this directory, there are the `arch_*` directories).
176+
> For example, if the downloader script is executed with `downloadFolder=/tmp/wdav-update`, and the HTTP server (`www.example.server.com:8000`) is hosting the `/tmp/wdav-update` path, then the corresponding URI is: `www.example.server.com:8000/linux/production/` (verify that within the directory, there are `arch_*` directories).
177177
>
178-
> We can also use the absolute path of directory (local/remote mount point). For example, if the files were downloaded by the script into a directory `/tmp/wdav-update`, then the corresponding URI is:`/tmp/wdav-update/linux/production`.
178+
> You can also use the absolute path of directory (local/remote mount point). For example, if the files are downloaded by the script into a directory `/tmp/wdav-update`, then the corresponding URI is:`/tmp/wdav-update/linux/production`.
179179
180-
Once the mirror server is set up, we need to propagate this URI to the Linux endpoints as the `offlineDefinitionUpdateUrl` in the Managed Configuration as described in the next section.
180+
Once the mirror server is set up, you need to propagate this URI to the Linux endpoints as the `offlineDefinitionUpdateUrl` in the Managed Configuration as described in the next section.
181181

182182
## Configure the endpoints
183183

@@ -205,12 +205,12 @@ Use the following sample `mdatp_managed.json` and update the parameters as per t
205205
| `automaticDefinitionUpdateEnabled` | `True`/`False` | Determines the behavior of Defender for Endpoint attempting to perform updates automatically, is turned on or off respectively. |
206206
| `definitionUpdatesInterval` | Numeric | Time of interval between each automatic update of signatures (in seconds). |
207207
| `offlineDefinitionUpdateUrl` | String | URL value generated as part of the mirror server setup. This can be either in terms of the remote server URL or a directory (local/remote mount point). See the previous section for information about how to specify this path.|
208-
| `offlineDefinitionUpdate` | `enabled`/`disabled` | When set to `enabled`, the "offline security intelligence update" feature is enabled, and vice versa. |
209-
| `offlineDefinitionUpdateFallbackToCloud` | `True`/`False` | Determine Defender for Endpoint security intelligence update approach when "offline mirror server" fails to serve the update request. If set to `true`, the update is retried via the Microsoft cloud when "offline security intelligence update" failed; else, vice versa. |
208+
| `offlineDefinitionUpdate` | `enabled`/`disabled` | When set to `enabled`, the offline security intelligence update feature is enabled, and vice versa. |
209+
| `offlineDefinitionUpdateFallbackToCloud` | `True`/`False` | Determine Defender for Endpoint security intelligence update approach when offline mirror server fails to serve the update request. If set to `true`, the update is retried via the Microsoft cloud when offline security intelligence update failed; else, vice versa. |
210210
| `offlineDefinitionUpdateVerifySig` | `enabled`/`disabled` | When set to `enabled`, downloaded definitions are verified on the endpoints; else, vice versa. |
211211

212212
> [!NOTE]
213-
> As of today, the "offline security intelligence update" feature can be configured on Linux endpoints via managed json only. Integration with security settings management on the security portal is in our roadmap.
213+
> Currently, offline security intelligence updates can be configured on Linux endpoints via managed json only. Integration with Defender for Endpoint security settings management in the Microsoft Defender portal is on the roadmap, but isn't available yet.
214214
215215
### Verify the configuration
216216

@@ -246,15 +246,15 @@ offline_definition_update_fallback_to_cloud : false[managed]
246246

247247
### Manual update
248248

249-
- To trigger the "offline security intelligence update" manually to download the signatures from the mirror server on the Linux endpoints, run the following command:
249+
- To trigger the offline security intelligence update manually to download the signatures from the mirror server on the Linux endpoints, run the following command:
250250

251251
```bash
252252
mdatp definitions update
253253
```
254254

255255
### Check update status
256256

257-
- After triggering the "offline security intelligence update" by either the automatic or manual method, verify that the update was successful by running the command: `mdatp health --details --definitions`.
257+
- After triggering offline security intelligence updates by using either the automatic or manual method, verify that the update was successful by running the command: `mdatp health --details --definitions`.
258258

259259
- Verify the following fields:
260260

0 commit comments

Comments
 (0)